APT38 is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau.[1] Active since at least 2014, APT38 has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. Significant operations include the 2016 Bank of Bangladesh heist, during which APT38 stole $81 million, as well as attacks against Bancomext [2] and Banco de Chile [2]; some of their attacks have been destructive.[1][2][3][4]
North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups.
Name | Description |
---|---|
NICKEL GLADSTONE | |
BeagleBoyz | |
Bluenoroff | |
Stardust Chollima | |
Sapphire Sleet | |
COPERNICIUM |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1548 | .002 | Abuse Elevation Control Mechanism: Bypass User Account Control |
APT38 has used the legitimate application |
Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
APT38 has created fake domains to imitate legitimate venture capital or bank domains.[9] |
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
APT38 used a backdoor, QUICKRIDE, to communicate to the C2 server over HTTP and HTTPS.[2] |
Enterprise | T1217 | Browser Information Discovery |
APT38 has collected browser bookmark information to learn more about compromised hosts, obtain personal information about users, and acquire details about internal network resources.[1] |
|
Enterprise | T1110 | Brute Force |
APT38 has used brute force techniques to attempt account access when passwords are unknown or when password hashes are unavailable.[1] |
|
Enterprise | T1115 | Clipboard Data |
APT38 used a Trojan called KEYLIME to collect data from the clipboard.[2] |
|
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
APT38 has used PowerShell to execute commands and other operational tasks.[1] |
.003 | Command and Scripting Interpreter: Windows Command Shell |
APT38 has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine.[2] Additionally, APT38 has used batch scripts.[9] |
||
.005 | Command and Scripting Interpreter: Visual Basic |
APT38 has used VBScript to execute commands and other operational tasks.[1][9] |
||
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
APT38 has installed a new Windows service to establish persistence.[1] |
Enterprise | T1485 | Data Destruction |
APT38 has used a custom secure delete function to make deleted files unrecoverable.[2] |
|
Enterprise | T1486 | Data Encrypted for Impact |
APT38 has used Hermes ransomware to encrypt files with AES256.[2] |
|
Enterprise | T1005 | Data from Local System | ||
Enterprise | T1565 | .001 | Data Manipulation: Stored Data Manipulation |
APT38 has used DYEPACK to create, delete, and alter records in databases used for SWIFT transactions.[2] |
.002 | Data Manipulation: Transmitted Data Manipulation |
APT38 has used DYEPACK to manipulate SWIFT messages en route to a printer.[2] |
||
.003 | Data Manipulation: Runtime Data Manipulation |
APT38 has used DYEPACK.FOX to manipulate PDF data as it is accessed to remove traces of fraudulent SWIFT transactions from the data displayed to the end user.[2] |
||
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
APT38 has used the RC4 algorithm to decrypt configuration data. [9] |
|
Enterprise | T1561 | .002 | Disk Wipe: Disk Structure Wipe |
APT38 has used a custom MBR wiper named BOOTWRECK to render systems inoperable.[2] |
Enterprise | T1189 | Drive-by Compromise |
APT38 has conducted watering holes schemes to gain initial access to victims.[2][1] |
|
Enterprise | T1480 | .002 | Execution Guardrails: Mutual Exclusion | |
Enterprise | T1083 | File and Directory Discovery |
APT38 have enumerated files and directories, or searched in specific locations within a compromised host.[1] |
|
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
APT38 has unhooked DLLs to disable endpoint detection and response (EDR) or anti-virus (AV) tools.[9] |
.003 | Impair Defenses: Impair Command History Logging |
APT38 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment.[1] |
||
.004 | Impair Defenses: Disable or Modify System Firewall |
APT38 have created firewall exemptions on specific ports, including ports 443, 6443, 8443, and 9443.[1] |
||
Enterprise | T1070 | .001 | Indicator Removal: Clear Windows Event Logs |
APT38 clears Window Event logs and Sysmon logs from the system.[2] |
.004 | Indicator Removal: File Deletion |
APT38 has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process.[2][1] |
||
.006 | Indicator Removal: Timestomp |
APT38 has modified data timestamps to mimic files that are in the same folder on a compromised host.[1] |
||
Enterprise | T1105 | Ingress Tool Transfer |
APT38 used a backdoor, NESTEGG, that has the capability to download and upload files to and from a victim’s machine.[2] Additionally, APT38 has downloaded other payloads onto a victim’s machine.[9] |
|
Enterprise | T1056 | .001 | Input Capture: Keylogging |
APT38 used a Trojan called KEYLIME to capture keystrokes from the victim’s machine.[2] |
Enterprise | T1036 | .003 | Masquerading: Rename Legitimate Utilities |
APT38 has renamed system utilities, such as |
.006 | Masquerading: Space after Filename |
APT38 has put several spaces before a file extension to avoid detection and suspicion.[9] |
||
Enterprise | T1112 | Modify Registry |
APT38 uses a tool called CLEANTOAD that has the capability to modify Registry keys.[2] |
|
Enterprise | T1106 | Native API |
APT38 has used the Windows API to execute code within a victim's system.[1] |
|
Enterprise | T1135 | Network Share Discovery |
APT38 has enumerated network shares on a compromised host.[1] |
|
Enterprise | T1027 | .002 | Obfuscated Files or Information: Software Packing |
APT38 has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants.[2] |
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
APT38 has obtained and used open-source tools such as Mimikatz.[10] |
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |